Description
Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-39572 | Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385. |
References
History
Tue, 20 Aug 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zendesk
Zendesk samson |
|
| CPEs | cpe:2.3:a:zendesk:samson:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zendesk
Zendesk samson |
|
| Metrics |
ssvc
|
Tue, 20 Aug 2024 20:30:00 +0000
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-20T20:53:00.400Z
Reserved: 2024-07-30T14:01:33.923Z
Link: CVE-2024-42363
Updated: 2024-08-20T20:52:51.961Z
Status : Awaiting Analysis
Published: 2024-08-20T21:15:14.543
Modified: 2024-08-21T12:30:33.697
Link: CVE-2024-42363
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD